Your files and analysis reports will be visible to anyone after processing. To keep your reports and files privately 🔓 Choose Plan
You can use Wireshark sniffer or other pcap tools to prepare .pcap files. Choose network adapter to capture packets and click "Capture". See details about installation and packets capturing on Wireshark FAQ.
You can use tcpdump (a data-network packet analyzer) to collect network packets. tcpdump allows filtration to adjust collected packets, see options on tcpdump main page. Run as superuser:
# tcpdump -i eth0 -w mycap.pcap
or use Wireshark sniffer.
# chmod 644 mycap.pcap
After pcap analysis will be finished you can follow a generated link to find a full report. Or just go to View Pcaps report section for public files. Reports for pcap files uploaded privately will appear in your personal profile. See plans and pricing.
The report contains network protocol analysis and found files in HTTP data. Use pcap visualization of network devices - see all features. There are also WiFi associating information, handshakes and user credentials, etc.
Pcap file contains sniffed network packets. You can use it detect various anomalies in network work. Details ...